General

  • Target

    2024-04-17_5e94bd6264c4b32f72962208b15b0018_cryptolocker

  • Size

    95KB

  • MD5

    5e94bd6264c4b32f72962208b15b0018

  • SHA1

    8d4bf15a0dd3a2c2b37fdf67b6914d298849fe6f

  • SHA256

    91b8f09fa34bb248d4982c86977289991bca0e5e67f61afb175d62074113f147

  • SHA512

    5b7e68a7e9e860cbdb2b455ce0a285ee92e9da943e9cd6819daa2f17400229ce53fcb359da8962c135fe0298c95c1a01a2eb0282bf4ace8da35d1e016ddb7948

  • SSDEEP

    1536:zj+soPSMOtEvwDpj4ktBl01hJl8QAPM8Ho6cRDjgx/b9:zCsanOtEvwDpjB5

Score
10/10
upx

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • Detection of Cryptolocker Samples 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-17_5e94bd6264c4b32f72962208b15b0018_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections